Solved

Finding spyware and hidden monitoring software

Posted on 2007-11-23
2
758 Views
Last Modified: 2013-11-18
We have a SBS 2003 that has very confidential information.

I did a McAfee Viruscan today and immediately received the Notification "The On-Demand Scan found alterations to code or data which may indicate that a rootkit is attempting to hide files, registry keys, processes or other items..."

It's the first time I've come across this and, although McAfee suggests a scan in safe mode, are there any good tools or ways using  McAfee Enterprise edition to determine if this is serious monitoring software and where it's coming from?

Thanks,

Mike
0
Comment
Question by:mikeabc27
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 2

Expert Comment

by:Dominik_L
ID: 20338845
There are many anti-rootkit utilities, but there is more probability that this is false alarm than it's really a rootkit.
You may try:
http://dobreprogramy.pl/index.php?dz=22&id=2181&t=55
http://dobreprogramy.pl/index.php?dz=22&id=1497&t=55

Try also online virus scanners like:
http://www.kaspersky.com/virusscanner
0
 
LVL 10

Accepted Solution

by:
yasserd earned 500 total points
ID: 20340792
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question